Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 16 Aug 2011 16:34:33 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE request: two vulnerabilities in ktsuss 1.4
 and earlier



----- Original Message -----
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> I reported these bugs privately to the Debian security team and the
> upstream author some time ago, but it does not appear that any CVE was
> created as a result.
> 
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=626178
> 
> The 1.3 and 1.4 versions of ktsuss which include a setuid ktsuss binary
> suffered from two separate security bugs which can be used for local root
> exploits.
> 
> The "1.314" version which does not include a setuid ktsuss binary and
> uses "su" for privilege escalation does not suffer from these problems.
> 
> 
> 1) When the target UID is the same as the real UID ktsuss skips
> authentication. Under these circumstances, ktsuss fails to change the
> effective UID back to the real UID. (line 118 of src/ktsuss.c in version
> 1.3.)
> 
> $ ktsuss -u `whoami` whoami
> root

Use CVE-2011-2921 for the above issue.

> 
> 
> 2) The setuid ktsuss binary executes a GTK interface subprocess to prompt
> for username and password. This GTK interface runs as root and allows
> arbitrary code execution via the GTK_MODULES environmental variable.

Use CVE-2011-2922 for this issue.

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.